2021-2022华为ICT大赛(全球)实验题研究

在公众号【易联无界】看到文章 [华为2021-2022全球总决赛实验题]

研究研究,搓一搓

文章很长,建议电脑端网页查看

文章末尾,附上ensp拓扑文件和配置导出文件

说明

  • ensp版本:1.3.00.100 V100R003C00SPC100
  • 电脑:Win10 ltsc (CPU:不配拥有名称,RAM=16GB)
  • FW桥接网卡只是直观查看会话和状态
  • 我电脑跑这图是真的卡
  • 遇到FW启动错误代码40,建议先启动两台FW,再启动其他设备
  • AR路由器我整不出G0/0/3接口,使用G3/0/0代替
  • Video server 地址修改为100.1.100.2
  • PC4手动配置IPv6地址 2001:200:1:200::254/64

实验拓扑

ENSP拓扑图

需求分析和配置

4.1 Task 1: Basic Data Configuration

4.1.1 Configuring VLANs

  • 按照给出的表格数据配置对应设备的vlan、Trunk、Access
  • 路由器接口注意配置子接口dot1q termination vid xx ,arp broadcast enable
  • 防火墙接口注意配置 vlan-type dot1q xx

4.1.2 Configuring IP Addresses

  • 按照给出的表格数据配置对应设备的IP地址、IPv6地址
  • 对于vrf接口和防火墙vsys接口,可先配置description描述
  • 配置必要的接口描述(后续配置静态路由时快速查看和检查)

4.2 Task 2: Route Deployment on the MAN

4.2.1 Configuring IGP

  • 配置IS-IS,进程号100,区域ID 86.0010,level-2路由器,系统ID的换算,直连不选举DIS
  • 配置接口cost,(设置cost-style wide)
  • IS-IS收敛参数,spf计算参数,lsp 快速泛洪
  • IS-IS hello md5认证
  • IPv6 IS-IS,IPv6的IS-IS cost

  • AR1/AR2/AR3/AR4/CR1/CR2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    # 区域ID + 系统ID换算
    AR1:
    network-entity 86.0010.0010.0100.1001.00
    AR2:
    network-entity 86.0010.0010.0100.1002.00
    AR3:
    network-entity 86.0010.0010.0100.1003.00
    AR4:
    network-entity 86.0010.0010.0100.1004.00
    CR1:
    network-entity 86.0010.0010.0100.1005.00
    CR2:
    network-entity 86.0010.0010.0100.1006.00
    #
    # AR1
    bfd
    #
    isis 100
    # level-2路由器
    is-level level-2
    # 设置IS-IS设备接收和发送路由的开销类型,默认narro的值范围为1-63,wide的值范围1-16777215
    cost-style wide
    # IS-IS收敛参数
    timer lsp-generation 1 50 100 level-2
    # lsp 快速泛洪
    flash-flood level-2
    # bfd
    bfd all-interfaces enable
    network-entity 86.0010.0010.0100.1001.00
    # spf计算参数
    timer spf 1 20 100
    # IPv6拓扑类型
    ipv6 enable topology ipv6
    #
    # loopback 0 接口运行isis
    interface LoopBack0
    isis enable 100
    isis ipv6 enable 100
    #
  • AR1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    #
    interface GigabitEthernet0/0/0
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 200 level-2
    isis cost 200 level-2
    #
    interface GigabitEthernet0/0/1
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 100 level-2
    isis cost 100 level-2
    #
  • AR2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    #
    interface GigabitEthernet0/0/0
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 200 level-2
    isis cost 200 level-2
    #
    interface GigabitEthernet0/0/1
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 100 level-2
    isis cost 100 level-2
    #
  • AR3

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    #
    interface GigabitEthernet0/0/0
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 200 level-2
    isis cost 200 level-2
    #
    interface GigabitEthernet0/0/2
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 100 level-2
    isis cost 100 level-2
    #
  • AR4

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    #
    interface GigabitEthernet0/0/0
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 200 level-2
    isis cost 200 level-2
    #
    interface GigabitEthernet0/0/2
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 100 level-2
    isis cost 100 level-2
    #
  • CR1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    #
    interface GigabitEthernet0/0/0
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 300 level-2
    isis cost 300 level-2
    #
    interface GigabitEthernet0/0/1
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 100 level-2
    isis cost 100 level-2
    #
    interface GigabitEthernet0/0/2
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 100 level-2
    isis cost 100 level-2
    #
  • CR2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    #
    interface GigabitEthernet0/0/0
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 300 level-2
    isis cost 300 level-2
    #
    interface GigabitEthernet0/0/1
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 100 level-2
    isis cost 100 level-2
    #
    interface GigabitEthernet0/0/2
    isis enable 100
    isis ipv6 enable 100
    isis circuit-type p2p
    isis authentication-mode md5 Huawei@123
    isis ipv6 cost 100 level-2
    isis cost 100 level-2
    #
  • 验证

    • dis ip routing-table protocol isis (配置完成6台路由器,查看路由表学到其他5台路由器的loopback0地址)

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      <AR1>dis ip routing-table protocol isis | i 1.1.1.
      Route Flags: R - relay, D - download to fib
      ------------------------------------------------------------------------------
      Public routing table : ISIS
      Destinations : 10 Routes : 11

      ISIS routing table status : <Active>
      Destinations : 10 Routes : 11

      Destination/Mask Proto Pre Cost Flags NextHop Interface

      1.1.1.2/32 ISIS-L2 15 200 D 10.1.2.2 GigabitEthernet0/0/0
      1.1.1.3/32 ISIS-L2 15 200 D 10.1.5.1 GigabitEthernet0/0/1
      1.1.1.4/32 ISIS-L2 15 400 D 10.1.5.1 GigabitEthernet0/0/1
      1.1.1.5/32 ISIS-L2 15 100 D 10.1.5.1 GigabitEthernet0/0/1
      1.1.1.6/32 ISIS-L2 15 300 D 10.1.2.2 GigabitEthernet0/0/0

      ISIS routing table status : <Inactive>
      Destinations : 0 Routes : 0

      <AR1>
    • dis ipv routing-table protocol isis (IPv6)

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      <CR2>dis ipv routing-table protocol isis | i 2022::
      Public Routing Table : ISIS
      Summary Count : 11

      ISIS Routing Table's Status : < Active >
      Summary Count : 11

      Destination : 2022::1 PrefixLength : 128
      Destination : 2022::2 PrefixLength : 128
      Destination : 2022::3 PrefixLength : 128
      Destination : 2022::4 PrefixLength : 128
      Destination : 2022::5 PrefixLength : 128
      ISIS Routing Table's Status : < Inactive >
      Summary Count : 0

      <CR2>

4.2.2 Configuring BGP

  • 配置MAN IBGP,AS64812,CR1和CR2为RR反射器(v4,vpnv4,v6),使用对等体组命令,使用loopback0作为源
  • 配置与DataCenter的EBGP,AS62022,使用loopback0(EBGP多跳)(v4,v6),LSW1和LSW2配置指向CR1,CR2的默认路由(后边有配置静态路由的需求)
  • 配置CR1,CR2 的v4 EBGP邻居md5认证
  • 配置CR1,CR2路由阻尼dampening
  • 配置CR1和CR2条件通告默认路由到AR1-AR4
  • 配置AR1,和AR3优选下一跳CR1,AR2和AR4优选下一跳CR2
  • 配置BGP network组播源服务器网段

  • CR1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    #
    bgp 64812
    router-id 1.1.1.5
    group ibgpv4 internal
    peer ibgpv4 connect-interface LoopBack0
    group ibgpv6 internal
    peer ibgpv6 connect-interface LoopBack0
    peer 1.1.1.1 group ibgpv4
    peer 1.1.1.2 group ibgpv4
    peer 1.1.1.3 group ibgpv4
    peer 1.1.1.4 group ibgpv4
    peer 1.1.1.6 group ibgpv4
    peer 2022::1 group ibgpv6
    peer 2022::2 group ibgpv6
    peer 2022::3 group ibgpv6
    peer 2022::4 group ibgpv6
    peer 2022::6 group ibgpv6
    peer 1.1.1.8 as-number 62022
    peer 1.1.1.8 ebgp-max-hop 2
    peer 1.1.1.8 connect-interface LoopBack0
    peer 1.1.1.8 password cipher Huawei@123
    peer 2022::8 as-number 62022
    peer 2022::8 ebgp-max-hop 2
    peer 2022::8 connect-interface LoopBack0
    #
    ipv4-family unicast
    reflector cluster-id 56.56.56.56
    dampening 10 2000 3000 10000
    network 100.1.100.0 255.255.255.252
    peer ibgpv4 reflect-client
    peer ibgpv4 next-hop-local
    peer ibgpv4 default-route-advertise conditional-route-match-all 100.1.200.0 255.255.255.0
    undo peer 1.1.1.6 default-route-advertise
    peer 1.1.1.8 enable
    #
    ipv6-family unicast
    reflector cluster-id 56.56.56.56
    dampening 10 2000 3000 10000
    peer 2022::8 enable
    peer ibgpv6 enable
    peer ibgpv6 reflect-client
    peer ibgpv6 next-hop-local
    peer 2022::1 group ibgpv6
    peer 2022::2 group ibgpv6
    peer 2022::3 group ibgpv6
    peer 2022::4 group ibgpv6
    peer 2022::6 group ibgpv6
    #
    ipv4-family vpnv4
    reflector cluster-id 56.56.56.56
    undo policy vpn-target
    peer ibgpv4 enable
    peer ibgpv4 reflect-client
    peer 1.1.1.1 group ibgpv4
    peer 1.1.1.2 group ibgpv4
    peer 1.1.1.3 group ibgpv4
    peer 1.1.1.4 group ibgpv4
    #
    #
    ip route-static 1.1.1.8 255.255.255.255 10.5.8.1
    #
    ipv6 route-static 2022::8 128 2001:5:8::1
    #
  • CR2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    #
    bgp 64812
    router-id 1.1.1.6
    group ibgpv4 internal
    peer ibgpv4 connect-interface LoopBack0
    group ibgpv6 internal
    peer ibgpv6 connect-interface LoopBack0
    peer 1.1.1.1 group ibgpv4
    peer 1.1.1.2 group ibgpv4
    peer 1.1.1.3 group ibgpv4
    peer 1.1.1.4 group ibgpv4
    peer 1.1.1.5 group ibgpv4
    peer 2022::1 group ibgpv6
    peer 2022::2 group ibgpv6
    peer 2022::3 group ibgpv6
    peer 2022::4 group ibgpv6
    peer 2022::5 group ibgpv6
    peer 1.1.1.9 as-number 62022
    peer 1.1.1.9 ebgp-max-hop 2
    peer 1.1.1.9 connect-interface LoopBack0
    peer 1.1.1.9 password cipher Huawei@123
    peer 2022::9 as-number 62022
    peer 2022::9 ebgp-max-hop 2
    peer 2022::9 connect-interface LoopBack0
    #
    ipv4-family unicast
    reflector cluster-id 56.56.56.56
    dampening 10 2000 3000 10000
    network 100.1.100.0 255.255.255.252
    peer ibgpv4 reflect-client
    peer ibgpv4 next-hop-local
    peer ibgpv4 default-route-advertise conditional-route-match-all 100.1.200.0 255.255.255.0
    undo peer 1.1.1.5 default-route-advertise
    peer 1.1.1.9 enable
    #
    ipv6-family unicast
    reflector cluster-id 56.56.56.56
    dampening 10 2000 3000 10000
    peer 2022::9 enable
    peer ibgpv6 enable
    peer ibgpv6 reflect-client
    peer ibgpv6 next-hop-local
    peer 2022::1 group ibgpv6
    peer 2022::2 group ibgpv6
    peer 2022::3 group ibgpv6
    peer 2022::4 group ibgpv6
    peer 2022::5 group ibgpv6
    #
    ipv4-family vpnv4
    reflector cluster-id 56.56.56.56
    undo policy vpn-target
    peer ibgpv4 enable
    peer ibgpv4 reflect-client
    peer 1.1.1.1 group ibgpv4
    peer 1.1.1.2 group ibgpv4
    peer 1.1.1.3 group ibgpv4
    peer 1.1.1.4 group ibgpv4
    #
    #
    ip route-static 1.1.1.9 255.255.255.255 10.6.9.1
    #
    ipv6 route-static 2022::9 128 2001:6:9::1
    #
  • AR1/AR2/AR3/AR4/,注意修改各路由器的router-id

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    # AR1
    bgp 64812
    router-id 1.1.1.1
    peer 1.1.1.5 as-number 64812
    peer 1.1.1.5 connect-interface LoopBack0
    peer 1.1.1.6 as-number 64812
    peer 1.1.1.6 connect-interface LoopBack0
    peer 2022::5 as-number 64812
    peer 2022::5 connect-interface LoopBack0
    peer 2022::6 as-number 64812
    peer 2022::6 connect-interface LoopBack0
    #
    ipv4-family unicast
    peer 1.1.1.5 next-hop-local
    peer 1.1.1.6 next-hop-local
    #
    ipv6-family unicast
    peer 2022::5 enable
    peer 2022::5 next-hop-local
    peer 2022::6 enable
    peer 2022::6 next-hop-local
    #
    ipv4-family vpnv4
    policy vpn-target
    peer 1.1.1.5 enable
    peer 1.1.1.6 enable
    #
  • AR1/AR3

    1
    2
    3
    4
    5
    6
    7
    #
    bgp 64812
    #
    ipv4-family unicast
    peer 1.1.1.5 preferred-value 2000
    peer 1.1.1.6 preferred-value 1000
    #
  • AR2/AR4

    1
    2
    3
    4
    5
    6
    7
    #
    bgp 64812
    #
    ipv4-family unicast
    peer 1.1.1.5 preferred-value 1000
    peer 1.1.1.6 preferred-value 2000
    #
  • LSW1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    #
    ip route-static 0.0.0.0 0.0.0.0 10.5.8.2
    #
    ipv6 route-static :: 0 2001:5:8::2
    #
    bgp 62022
    router-id 1.1.1.8
    peer 1.1.1.5 as-number 64812
    peer 1.1.1.5 ebgp-max-hop 2
    peer 1.1.1.5 connect-interface LoopBack0
    peer 1.1.1.5 password cipher Huawei@123
    peer 2022::5 as-number 64812
    peer 2022::5 ebgp-max-hop 2
    peer 2022::5 connect-interface LoopBack0
    #
    ipv4-family unicast
    peer 1.1.1.5 enable
    #
    ipv6-family unicast
    peer 2022::5 enable
    #
  • LSW2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    #
    ip route-static 0.0.0.0 0.0.0.0 10.6.9.2
    #
    ipv6 route-static :: 0 2001:6:9::2
    #
    bgp 62022
    router-id 1.1.1.9
    peer 1.1.1.6 as-number 64812
    peer 1.1.1.6 ebgp-max-hop 2
    peer 1.1.1.6 connect-interface LoopBack0
    peer 1.1.1.6 password cipher Huawei@123
    peer 2022::6 as-number 64812
    peer 2022::6 ebgp-max-hop 2
    peer 2022::6 connect-interface LoopBack0
    #
    ipv4-family unicast
    peer 1.1.1.6 enable
    #
    ipv6-family unicast
    peer 2022::6 enable
    #
  • 验证

    • dis bgp peer (IPv4peer)

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      <AR1>dis bgp peer 

      BGP local router ID : 1.1.1.1
      Local AS number : 64812
      Total number of peers : 2 Peers in established state : 2

      Peer V AS MsgRcvd MsgSent OutQ Up/Down State PrefRcv

      1.1.1.5 4 64812 15 14 0 00:12:14 Established 1
      1.1.1.6 4 64812 15 14 0 00:12:14 Established 1
      <AR1>
    • dis bgp ipv6 peer (IPv6 peer)

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      <AR2>dis bgp ipv6 peer 

      BGP local router ID : 1.1.1.2
      Local AS number : 64812
      Total number of peers : 2 Peers in established state : 2

      Peer V AS MsgRcvd MsgSent OutQ Up/Down State PrefRcv

      2022::5 4 64812 12 12 0 00:10:23 Established 0
      2022::6 4 64812 12 12 0 00:10:22 Established 0
      <AR2>
    • dis bgp vpnv4 all peer (vpnv4 peer)

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      <CR1>dis bgp vpnv4 all peer 

      BGP local router ID : 1.1.1.5
      Local AS number : 64812
      Total number of peers : 4 Peers in established state : 4

      Peer V AS MsgRcvd MsgSent OutQ Up/Down State PrefRcv

      1.1.1.1 4 64812 21 23 0 00:19:24 Established 0
      1.1.1.2 4 64812 19 21 0 00:17:19 Established 0
      1.1.1.3 4 64812 19 21 0 00:17:52 Established 0
      1.1.1.4 4 64812 18 20 0 00:16:52 Established 0
      <CR1>
    • dis bgp routing-table

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      <AR4>dis bgp routing-table

      BGP Local router ID is 1.1.1.4
      Status codes: * - valid, > - best, d - damped,
      h - history, i - internal, s - suppressed, S - Stale
      Origin : i - IGP, e - EGP, ? - incomplete


      Total Number of Routes: 2
      Network NextHop MED LocPrf PrefVal Path/Ogn

      *>i 100.1.100.0/30 1.1.1.5 0 100 2000 i
      * i 1.1.1.5 0 100 1000 i
      <AR4>
    • dis bgp routing-table 100.1.100.0

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      22
      23
      24
      25
      26
      27
      28
      <AR4>dis bgp routing-table 100.1.100.0

      BGP local router ID : 1.1.1.4
      Local AS number : 64812
      Paths: 2 available, 1 best, 1 select
      BGP routing table entry information of 100.1.100.0/30:
      From: 1.1.1.6 (1.1.1.6)
      Route Duration: 00h03m40s
      Relay IP Nexthop: 10.3.4.1
      Relay IP Out-Interface: GigabitEthernet0/0/0
      Original nexthop: 1.1.1.5
      Qos information : 0x0
      AS-path Nil, origin igp, MED 0, localpref 100, pref-val 2000, valid, internal, best, select, active, pre 255, IGP cost 300
      Originator: 1.1.1.5
      Cluster list: 56.56.56.56
      Not advertised to any peer yet

      BGP routing table entry information of 100.1.100.0/30:
      From: 1.1.1.5 (1.1.1.5)
      Route Duration: 00h03m40s
      Relay IP Nexthop: 10.3.4.1
      Relay IP Out-Interface: GigabitEthernet0/0/0
      Original nexthop: 1.1.1.5
      Qos information : 0x0
      AS-path Nil, origin igp, MED 0, localpref 100, pref-val 1000, valid, internal, pre 255, IGP cost 300, not preferred for PreVal
      Not advertised to any peer yet

      <AR4>

4.3 Task 3: Data Center Internet Service Deployment

4.3.1 Connecting the Web Server to the Network

  • 配置LSW1,LSW2的eth-trunk 12,静态lacp,src-mac 负载均衡

  • 创建vrf intvpn,不传vpnv4用不到RD和RT

  • vlan200,下配置vrrp,vrid 2,virtual-ip 192.168.200.1/24,LSW2为master,优先级120,抢占延迟20s,track接口G0/0/2状态,失效优先级减21成为backup

  • 配置nqa探测,LSW1-CR1,LSW2-CR2,类型icmp,5s间隔周期探测时间,

  • 配置出向静态路由,backup路由优先级90,看示意图,LSW1-CR1,LSW2-CR2 的默认路由track nqa,配置默认路由备份路由指向 LSW1 LSW2

  • 配置入向静态路由,看示意图

  • FW1配置安全策略,看示意图

  • FW1配置NAT映射,策略包含80端口,放行icmp

  • LSW1和LSW2之间的备份路由在出口全部宕机的情况下的环路处理

  • BGP network (web服务器公网映射网段路由)


  • LSW1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    #
    interface GigabitEthernet0/0/4
    undo eth-trunk
    #
    interface GigabitEthernet0/0/5
    undo eth-trunk
    #
    interface Eth-Trunk12
    mode lacp-static
    load-balance src-mac
    #
    interface GigabitEthernet0/0/4
    eth-trunk 12
    #
    interface GigabitEthernet0/0/5
    eth-trunk 12
    #
    ip vpn-instance intvpn
    ipv4-family
    #
    interface Vlanif200
    description VPN-intvpn
    ip binding vpn-instance intvpn
    ip address 192.168.200.8 255.255.255.0
    vrrp vrid 2 virtual-ip 192.168.200.1
    vrrp vrid 2 preempt-mode timer delay 20
    #
    interface Vlanif30
    description VPN-intvpn
    ip binding vpn-instance intvpn
    ip address 192.168.3.1 255.255.255.252
    #
    nqa test-instance toCR toCR
    test-type icmp
    destination-address ipv4 10.5.8.2
    frequency 5
    interval seconds 1
    timeout 1
    probe-count 2
    start now
    #
    ip route-static 0.0.0.0 0.0.0.0 10.5.8.2 track nqa toCR toCR
    ip route-static 0.0.0.0 0.0.0.0 192.168.9.2 preference 90
    ip route-static 100.1.200.0 255.255.255.0 100.1.4.2
    ip route-static vpn-instance intvpn 0.0.0.0 0.0.0.0 192.168.3.2
    #
    #
    bgp 62022
    #
    ipv4-family unicast
    network 100.1.200.0 24
    #
    # 阻止LSW1-LSW2备份路由形成的环路
    nqa test-instance PREVENT_LOOP PREVENT_LOOP
    test-type icmp
    destination-address ipv4 10.6.9.1
    frequency 5
    interval seconds 1
    timeout 1
    probe-count 2
    start now
    #
    ip route-static 10.6.9.1 255.255.255.255 192.168.9.2
    ip route-static 0.0.0.0 0.0.0.0 192.168.9.2 preference 90 track nqa PREVENT_LOOP PREVENT_LOOP
    #
  • LSW2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    #
    interface GigabitEthernet0/0/4
    undo eth-trunk
    #
    interface GigabitEthernet0/0/5
    undo eth-trunk
    #
    interface Eth-Trunk12
    port link-type trunk
    port trunk allow-pass vlan 90 100 200
    mode lacp-static
    load-balance src-mac
    #
    interface GigabitEthernet0/0/4
    eth-trunk 12
    #
    interface GigabitEthernet0/0/5
    eth-trunk 12
    #
    ip vpn-instance intvpn
    ipv4-family
    #
    interface Vlanif200
    description VPN-intvpn
    ip binding vpn-instance intvpn
    ip address 192.168.200.9 255.255.255.0
    vrrp vrid 2 virtual-ip 192.168.200.1
    vrrp vrid 2 priority 120
    vrrp vrid 2 preempt-mode timer delay 20
    vrrp vrid 2 track interface GigabitEthernet0/0/2 reduced 21
    #
    interface Vlanif30
    description VPN-intvpn
    ip binding vpn-instance intvpn
    ip address 192.168.30.1 255.255.255.252
    #
    nqa test-instance toCR toCR
    test-type icmp
    destination-address ipv4 10.6.9.2
    frequency 5
    interval seconds 1
    timeout 1
    probe-count 2
    start now
    #
    ip route-static 0.0.0.0 0.0.0.0 10.6.9.2 track nqa toCR toCR
    ip route-static 0.0.0.0 0.0.0.0 192.168.9.1 preference 90
    ip route-static 100.1.200.0 255.255.255.0 100.1.40.2
    ip route-static vpn-instance intvpn 0.0.0.0 0.0.0.0 192.168.30.2
    #
    #
    bgp 62022
    #
    ipv4-family unicast
    network 100.1.200.0 24
    #
    # 阻止LSW1-LSW2备份路由形成的环路
    nqa test-instance PREVENT_LOOP PREVENT_LOOP
    test-type icmp
    destination-address ipv4 10.5.8.1
    frequency 5
    interval seconds 1
    timeout 1
    probe-count 2
    start now
    #
    ip route-static 10.5.8.1 255.255.255.255 192.168.9.1
    ip route-static 0.0.0.0 0.0.0.0 192.168.9.1 preference 90 track nqa PREVENT_LOOP PREVENT_LOOP
    #
  • FW1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    #
    ip route-static 0.0.0.0 0.0.0.0 100.1.40.1
    ip route-static 0.0.0.0 0.0.0.0 100.1.4.1 preference 90
    ip route-static 192.168.200.0 255.255.255.0 192.168.30.1
    ip route-static 192.168.200.0 255.255.255.0 192.168.3.1 preference 90
    #
    firewall zone untrust
    add interface GigabitEthernet1/0/1.40
    add interface GigabitEthernet1/0/2.40
    #
    firewall zone dmz
    add interface GigabitEthernet1/0/1.30
    add interface GigabitEthernet1/0/2.30
    #
    security-policy
    rule name untrust2dmz
    source-zone untrust
    destination-zone dmz
    destination-address 192.168.200.0 mask 255.255.255.0
    action permit
    #
    nat server web_server protocol tcp global 100.1.200.254 www inside 192.168.200.254 www
    nat server icmp_server protocol icmp global 100.1.200.254 inside 192.168.200.254
    #
  • AR4

    1
    2
    3
    4
    5
    6
    #
    bgp 64812
    #
    ipv4-family unicast
    network 200.1.200.0 24
    #
  • PC4 ping测试和Http Client 测试

    image-004420171

4.3.2 Connecting the Simulated IPv6 Servers to the Network

  • LSW1和LSW2创建loopback1,配置IPv6地址
  • 配置ospfv3,进程号200,vlanif90 建立邻居,改网络类型不选DR
  • BGP 仅 import 两loopback1 IPv6地址,挂上route-map ,prefix配置
  • 配置路由聚合,112掩码

  • LSW1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    #
    ospfv3 200
    router-id 1.1.1.8
    interface LoopBack1
    ipv6 enable
    ipv6 address 2001:100:1:200::8/128
    ospfv3 200 area 0.0.0.0
    #
    interface Vlanif90
    ospfv3 200 area 0.0.0.0
    ospfv3 network-type p2p
    #
    ip ipv6-prefix V6_SERVER permit 2001:100:1:200::8 128
    ip ipv6-prefix V6_SERVER permit 2001:100:1:200::9 128
    #
    route-policy V6_SERVER permit node 10
    if-match ipv6 address prefix-list V6_SERVER
    #
    bgp 62022
    ipv6-family unicast
    aggregate 2001:100:1:200:: 112 detail-suppressed
    import-route ospfv3 200 route-policy V6_SERVER

  • LSW2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    #
    ospfv3 200
    router-id 1.1.1.9
    #
    interface LoopBack1
    ipv6 enable
    ipv6 address 2001:100:1:200::9/128
    ospfv3 200 area 0.0.0.0
    #
    interface Vlanif90
    ospfv3 200 area 0.0.0.0
    ospfv3 network-type p2p
    #
    ip ipv6-prefix V6_SERVER permit 2001:100:1:200::8 128
    ip ipv6-prefix V6_SERVER permit 2001:100:1:200::9 128
    #
    route-policy V6_SERVER permit node 10
    if-match ipv6 address prefix-list V6_SERVER
    #
    bgp 62022
    ipv6-family unicast
    aggregate 2001:100:1:200:: 112 detail-suppressed
    import-route ospfv3 200 route-policy V6_SERVER
  • AR4

    1
    2
    3
    bgp 64812
    ipv6-family unicast
    network 2001:200:1:200:: 64
  • PC4 配置IPv6地址-2001:200:1:200::254/64; IPv6网关-2001:200:1:200::1

    image-140018166

  • PC4 ping测试

    image-013227537

    image-013202951

4.3.3 Configuring Security Protection on the Firewall

  • 拉黑200.1.200.200地址

  • FW1

    1
    2
    [FW1]firewall blacklist enable 
    [FW1]firewall blacklist item source-ip 200.1.200.200

4.4 Task 4: Enterprise HQ Network Deployment

4.4.1 Configuring a Layer 2 Network

  • 端口安全,动态安全地址,mac 抖动,最大mac地址2,aging time 1200m
  • 端口学习mac地址的优先级

  • LSW3

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    #
    interface GigabitEthernet0/0/2
    mac-learning priority 3
    #
    interface GigabitEthernet0/0/4
    port-security enable
    port-security protect-action shutdown
    port-security max-mac-num 2
    port-security mac-address sticky
    port-security aging-time 1200
    #
  • LSW4

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    #
    interface GigabitEthernet0/0/2
    mac-learning priority 3
    #
    interface GigabitEthernet0/0/3
    port-security enable
    port-security protect-action shutdown
    port-security max-mac-num 2
    port-security mac-address sticky
    port-security aging-time 1200
    #

4.4.2 Configuring Basic Services on the Firewall

  • 配置安全策略,HQ 172.16.100.0/24和Branch172.17.100.0/24上互联网(NAT need)
  • 配置安全策略,HQ 172.16.101.0/24 访问OA 192.168.100.0/24(FW1上做了映射公网)
  • 配置ip-link ,FW2-AR1, FW2-AR2,搭配后续的出向默认路由使用
  • 出向静态路由
  • 入向静态路由,AR1和AR2 (200.1.100.0/24)指向 FW2;FW2配置特定主备路由指向LSW3 LSW4
  • 配置NAT,接入互联网,最终ping通WEB服务器和Video服务器需要这个,转换地址池200.1.100.2 - 200.1.100.10

  • FW2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    #
    firewall zone trust
    add interface GigabitEthernet1/0/3.30
    add interface GigabitEthernet1/0/4.40
    #
    firewall zone untrust
    add interface GigabitEthernet1/0/3.60
    add interface GigabitEthernet1/0/4.70
    #
    ip-link check enable
    ip-link name toar1
    destination 200.1.6.1 interface GigabitEthernet1/0/3.60 mode arp
    ip-link name toar2
    destination 200.1.7.1 interface GigabitEthernet1/0/4.70 mode arp
    #
    security-policy
    rule name trust2untrust01
    source-zone trust
    destination-zone untrust
    source-address 172.16.100.0 mask 255.255.255.0
    source-address 172.17.100.0 mask 255.255.255.0
    action permit
    rule name trust2untrust02
    source-zone trust
    destination-zone untrust
    source-address 172.16.101.0 mask 255.255.255.0
    destination-address 192.168.100.0 mask 255.255.255.0
    action permit
    #
    ip route-static 0.0.0.0 0.0.0.0 200.1.6.1 track ip-link toar1
    ip route-static 0.0.0.0 0.0.0.0 200.1.7.1 track ip-link toar2
    ip route-static 172.16.100.0 255.255.255.0 172.16.3.1
    ip route-static 172.16.100.0 255.255.255.0 172.16.4.1 preference 90
    ip route-static 172.16.101.0 255.255.255.0 172.16.4.1
    ip route-static 172.16.101.0 255.255.255.0 172.16.3.1 preference 90
    ip route-static 172.17.100.0 255.255.255.0 172.16.3.1
    ip route-static 172.17.100.0 255.255.255.0 172.16.4.1
    #
    nat address-group addressgroup1 0
    mode pat
    section 0 200.1.100.2 200.1.100.10
    #
    nat-policy
    rule name policy_nat1
    source-zone trust
    destination-zone untrust
    source-address 172.16.100.0 mask 255.255.255.0
    source-address 172.17.100.0 mask 255.255.255.0
    destination-address 100.1.0.0 mask 255.255.0.0
    action source-nat address-group addressgroup1
    #
  • LSW3

    1
    2
    3
    #
    ip route-static 0.0.0.0 0.0.0.0 172.16.3.2
    #
  • LSW4

    1
    2
    3
    #
    ip route-static 0.0.0.0 0.0.0.0 172.16.4.2
    #
  • AR1

    1
    2
    3
    4
    5
    6
    7
    8
    #
    ip route-static 200.1.100.0 255.255.255.0 200.1.6.2
    #
    bgp 64812
    #
    ipv4-family unicast
    import-route static
    #
  • AR2

    1
    2
    3
    4
    5
    6
    7
    8
    #
    ip route-static 200.1.100.0 255.255.255.0 200.1.7.2
    #
    bgp 64812
    #
    ipv4-family unicast
    import-route static
    #
  • 验证

    image-124106425

    image-124147896

4.4.3 Configuring URL Filtering on the Firewall

  • url-filter profile的配置,去网页点点看

    1
    2
    3
    4
    5
    6
    7
    #
    profile type url-filter name url_profile_deny
    add blacklist url www.example1.com
    add blacklist url www.example2.com
    category pre-defined control-level medium
    https-filter enable
    #

4.4.4 Configuring the IPS Function on the Firewall

  • ips profile的配置,去网页点点看

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    #
    profile type ips name Profile_ips_pc
    collect-attack-evidence enable # 依赖硬盘,ensp不起作用
    signature-set name filter_web
    target client
    severity high
    protocol HTTP
    #
    security-policy
    rule name trust2untrust01
    profile ips Profile_ips_pc
    #

4.4.5 Configuring Traffic Management on the Firewall

  • 配置流量管理,去网页点点看

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    #
    time-range work_time
    period-range 09:00:00 to 18:00:00 working-day
    #
    traffic-policy
    profile profile_p2p
    bandwidth maximum-bandwidth whole both 50000
    bandwidth connection-limit whole both 2000
    profile profile_email
    bandwidth guaranteed-bandwidth whole both 100000
    bandwidth priority 7
    rule name policy_p2p
    source-zone trust
    destination-zone untrust
    source-address address-set 172.16.100.0&172.17.100.0
    application app BT
    application app YouKu
    action qos profile profile_p2p
    rule name policy_email
    source-zone trust
    destination-zone untrust
    source-address 172.16.100.0 mask 255.255.255.0
    source-address 172.17.100.0 mask 255.255.255.0
    application app LotusNotes
    application app OWA
    application category Business_Systems sub-category Email
    action qos profile profile_email
    #

4.5 Task 5: Enterprise Branch Network Deployment

4.5.1 Configuring DHCP

  • LSW5配置DHCP,此DHCP Server后续的无线sta获取地址也需要用到
  • DHCP参数,vlanif100接口,dns 8.8.8.8,lease 2d
  • LSW6,配置DHCP snooping,上联dhcp server接口trusted
  • 可能的bug(PC3和STA1获取不到IP地址,在LSW5去掉DHCP配置再重新刷入配置解决)

  • LSW5

    1
    2
    3
    4
    5
    6
    7
    8
    #
    dhcp enable
    #
    interface Vlanif100
    dhcp select interface
    dhcp server lease day 2
    dhcp server dns-list 8.8.8.8
    #
  • LSW6

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    #
    dhcp enable
    #
    dhcp snooping enable
    arp dhcp-snooping-detect enable
    #
    interface Ethernet0/0/1
    dhcp snooping check dhcp-rate enable
    dhcp snooping check dhcp-rate 80
    #
    interface GigabitEthernet0/0/1
    port trunk pvid vlan 200
    dhcp snooping check dhcp-rate enable
    dhcp snooping check dhcp-rate 80
    #
    interface GigabitEthernet0/0/2
    dhcp snooping enable
    dhcp snooping trusted
    #

4.5.2 Configuring a WLAN

  • 配置旁挂二层直接转发+ vrrp热备冗余+hsb状态同步
  • 黑名单拉黑sta2接入
  • 动态拉黑攻击者mac
  • 流量模板限速
  • ensp要是支持配置同步功能就厉害了

  • AC1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    70
    71
    72
    73
    74
    #
    dhcp enable
    # 下面这行说dhcp信息可以从文件恢复,很重要么这点信息?
    # dhcp server database enable
    #
    interface Vlanif200
    ip address 172.17.200.2 255.255.255.0
    vrrp vrid 1 virtual-ip 172.17.200.1
    admin-vrrp vrid 1
    vrrp vrid 1 priority 200
    dhcp select interface
    dhcp server excluded-ip-address 172.17.200.1 172.17.200.3
    #
    capwap source ip-address 172.17.200.1
    #
    wlan
    # 流量模板
    traffic-profile name wlan-traffic
    rate-limit client up 5000
    rate-limit vap up 100000
    rate-limit client down 10000
    rate-limit vap down 500000
    # 安全模板
    security-profile name wlan-security
    security wpa-wpa2 psk pass-phrase Huawei@123 aes
    # 黑名单拉黑sta2
    sta-blacklist-profile name sta-blacklist
    sta-mac 5489-988a-0449
    # 空白的白名单
    sta-whitelist-profile name sta-whitelist
    # SSID模板
    ssid-profile name wlan-ssid
    ssid ICT2022
    # VAP模板
    vap-profile name wlan-vap
    service-vlan vlan-id 100
    sta-access-mode whitelist sta-whitelist
    ssid-profile wlan-ssid
    security-profile wlan-security
    traffic-profile wlan-traffic
    # WIDS模板
    wids-profile name wlan-wids
    brute-force-detect interval 80
    brute-force-detect threshold 5
    brute-force-detect quiet-time 800
    dynamic-blacklist enable
    # AP系统模板
    ap-system-profile name wlan-system
    dynamic-blacklist aging-time 300
    sta-access-mode blacklist sta-blacklist
    # AP组
    ap-group name ap-group
    ap-system-profile wlan-system
    wids-profile wlan-wids
    radio 0
    vap-profile wlan-vap wlan 1
    ap-id 0 type-id 61 ap-mac 00e0-fcf8-2fb0 ap-sn 2102354483106349735D
    ap-name AP1
    ap-group ap-group
    #
    hsb-service 0
    service-ip-port local-ip 172.17.200.2 peer-ip 172.17.200.3 local-data-port 10241 peer-data-port 10241
    #
    hsb-group 0
    track vrrp vrid 1 interface Vlanif200
    bind-service 0
    hsb enable # 配置完成其他配置再启用查看状态
    #
    hsb-service-type access-user hsb-group 0
    #
    hsb-service-type dhcp hsb-group 0
    #
    hsb-service-type ap hsb-group 0
    #
  • AC2 ,修改参数即可,wlan配置与AC 1 一致,粘贴注意有时需要输入 Y 确认

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    70
    71
    #
    dhcp enable
    #
    interface Vlanif200
    ip address 172.17.200.3 255.255.255.0
    vrrp vrid 1 virtual-ip 172.17.200.1
    admin-vrrp vrid 1
    dhcp select interface
    dhcp server excluded-ip-address 172.17.200.1 172.17.200.3
    #
    capwap source ip-address 172.17.200.1
    #
    wlan
    # 流量模板
    traffic-profile name wlan-traffic
    rate-limit client up 5000
    rate-limit vap up 100000
    rate-limit client down 10000
    rate-limit vap down 500000
    # 安全模板
    security-profile name wlan-security
    security wpa-wpa2 psk pass-phrase Huawei@123 aes
    # 黑名单拉黑sta2
    sta-blacklist-profile name sta-blacklist
    sta-mac 5489-988a-0449
    # 空白的白名单
    sta-whitelist-profile name sta-whitelist
    # SSID模板
    ssid-profile name wlan-ssid
    ssid ICT2022
    # VAP模板
    vap-profile name wlan-vap
    service-vlan vlan-id 100
    sta-access-mode whitelist sta-whitelist
    ssid-profile wlan-ssid
    security-profile wlan-security
    traffic-profile wlan-traffic
    # WIDS模板
    wids-profile name wlan-wids
    brute-force-detect interval 80
    brute-force-detect threshold 5
    brute-force-detect quiet-time 800
    dynamic-blacklist enable
    # AP系统模板
    ap-system-profile name wlan-system
    dynamic-blacklist aging-time 300
    sta-access-mode blacklist sta-blacklist
    # AP组
    ap-group name ap-group
    ap-system-profile wlan-system
    wids-profile wlan-wids
    radio 0
    vap-profile wlan-vap wlan 1
    ap-id 0 type-id 61 ap-mac 00e0-fcf8-2fb0 ap-sn 2102354483106349735D
    ap-name AP1
    ap-group ap-group
    #
    hsb-service 0
    service-ip-port local-ip 172.17.200.3 peer-ip 172.17.200.2 local-data-port 10241 peer-data-port 10241
    #
    hsb-group 0
    track vrrp vrid 1 interface Vlanif200
    bind-service 0
    hsb enable
    #
    hsb-service-type access-user hsb-group 0
    #
    hsb-service-type dhcp hsb-group 0
    #
    hsb-service-type ap hsb-group 0
    #
  • 校验

    • dis vrrp

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      22
      23
      24
      25
      26
      27
      28
      29
      30
      31
      32
      33
      34
      35
      36
      37
      38
      39
      40
      [AC1]dis vrrp  
      Vlanif200 | Virtual Router 1
      State : Master
      Virtual IP : 172.17.200.1
      Master IP : 172.17.200.2
      PriorityRun : 222
      PriorityConfig : 222
      MasterPriority : 222
      Preempt : YES Delay Time : 0 s
      TimerRun : 1 s
      TimerConfig : 1 s
      Auth type : NONE
      Virtual MAC : 0000-5e00-0101
      Check TTL : YES
      Config type : admin-vrrp
      Backup-forward : disabled
      Create time : 2024-07-16 21:14:14 UTC-05:13
      Last change time : 2024-07-16 21:14:27 UTC-05:13

      [AC1]

      [AC2]dis vrrp
      Vlanif200 | Virtual Router 1
      State : Backup
      Virtual IP : 172.17.200.1
      Master IP : 172.17.200.2
      PriorityRun : 111
      PriorityConfig : 111
      MasterPriority : 222
      Preempt : YES Delay Time : 0 s
      TimerRun : 1 s
      TimerConfig : 1 s
      Auth type : NONE
      Virtual MAC : 0000-5e00-0101
      Check TTL : YES
      Config type : admin-vrrp
      Backup-forward : disabled
      Create time : 2024-07-16 20:19:15 UTC-05:13
      Last change time : 2024-07-16 21:14:58 UTC-05:13

    • dis hsb-group 0

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      22
      23
      24
      25
      26
      27
      28
      29
      30
      31
      32
      33
      34
      35
      [AC1]dis hsb-group 0
      Hot Standby Group Information:
      ----------------------------------------------------------
      HSB-group ID : 0
      Vrrp Group ID : 1
      Vrrp Interface : Vlanif200
      Service Index : 0
      Group Vrrp Status : Master
      Group Status : Active
      Group Backup Process : Realtime
      Peer Group Device Name : AC6005
      Peer Group Software Version : V200R007C10SPC300B220
      Group Backup Modules : Access-user
      DHCP
      AP
      ----------------------------------------------------------
      [AC1]

      [AC2]dis hsb-group 0
      Hot Standby Group Information:
      ----------------------------------------------------------
      HSB-group ID : 0
      Vrrp Group ID : 1
      Vrrp Interface : Vlanif200
      Service Index : 0
      Group Vrrp Status : Backup
      Group Status : Inactive
      Group Backup Process : Realtime
      Peer Group Device Name : AC6005
      Peer Group Software Version : V200R007C10SPC300B220
      Group Backup Modules : Access-user
      DHCP
      AP
      ----------------------------------------------------------
      [AC2]
    • dis hsb-service 0

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      22
      23
      24
      25
      26
      27
      [AC1]dis hsb-service 0
      Hot Standby Service Information:
      ----------------------------------------------------------
      Local IP Address : 172.17.200.2
      Peer IP Address : 172.17.200.3
      Source Port : 10241
      Destination Port : 10241
      Keep Alive Times : 5
      Keep Alive Interval : 3
      Service State : Connected
      Service Batch Modules :
      ----------------------------------------------------------
      [AC1]

      [AC2]dis hsb-service 0
      Hot Standby Service Information:
      ----------------------------------------------------------
      Local IP Address : 172.17.200.3
      Peer IP Address : 172.17.200.2
      Source Port : 10241
      Destination Port : 10241
      Keep Alive Times : 5
      Keep Alive Interval : 3
      Service State : Connected
      Service Batch Modules :
      ----------------------------------------------------------
      [AC2]
    • dis ap all

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      22
      23
      [AC1]dis ap all
      Info: This operation may take a few seconds. Please wait for a moment.done.
      Total AP information:
      nor : normal [1]
      ---------------------------------------------------------------------------------------------
      ID MAC Name Group IP Type State STA Uptime
      ---------------------------------------------------------------------------------------------
      0 00e0-fcf8-2fb0 AP1 ap-group 172.17.200.132 AP4050DN-E nor 1 22M:17S
      ---------------------------------------------------------------------------------------------
      Total: 1
      [AC1]

      [AC2]dis ap all
      Info: This operation may take a few seconds. Please wait for a moment.done.
      Total AP information:
      stdby: standby [1]
      --------------------------------------------------------------------------------------------
      ID MAC Name Group IP Type State STA Uptime
      --------------------------------------------------------------------------------------------
      0 00e0-fcf8-2fb0 AP1 ap-group 172.17.200.132 AP4050DN-E stdby 0 -
      --------------------------------------------------------------------------------------------
      Total: 1
      [AC2]
    • dis station all

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      [AC1]dis station all
      Rf/WLAN: Radio ID/WLAN ID
      Rx/Tx: link receive rate/link transmit rate(Mbps)
      -----------------------------------------------------------------------------------------------------
      STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address SSID
      -----------------------------------------------------------------------------------------------------
      5489-9811-592c 0 AP1 0/1 2.4G - -/- - 100 172.17.100.254 ICT2022
      -----------------------------------------------------------------------------------------------------
      Total: 1 2.4G: 1 5G: 0
      [AC1]

      [AC2]dis station all
      Rf/WLAN: Radio ID/WLAN ID
      Rx/Tx: link receive rate/link transmit rate(Mbps)
      --------------------------------------------------------------------------------------------------
      STA MAC AP ID Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address SSID
      --------------------------------------------------------------------------------------------------
      --------------------------------------------------------------------------------------------------
      Total: 0 2.4G: 0 5G: 0
      [AC2]
    • dis station online-fail-record all

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      [AC1]dis station online-fail-record all
      Rf/WLAN: Radio ID/WLAN ID
      ------------------------------------------------------------------------------
      STA MAC AP ID Ap name Rf/WLAN Last record time
      Reason
      ------------------------------------------------------------------------------
      5489-988a-0449 0 AP1 0/1 2024-07-19/10:35:02
      The STA is in the global blacklist.
      ------------------------------------------------------------------------------
      Total stations: 1 Total records: 1
      [AC1]

4.6 Task 6: Service Deployment for Communication Between the Enterprise HQ and Branch

4.6.1 Configuring an MPLSVPN

  • 配置ldp,loopback0接口地址为lsr-id,
  • AR1/AR2/AR3/AR4,配置vrf entvpn,需要配置RD,RT
  • AR1/AR2/LSW3/LSW4配置ospf,进程号100,area0,LSW3/LSW4下发默认路由,面向PC的vlanif接口配置passive被动接口
  • LSW5/AR3/AR4/配置EBGP,AS62012,branch使用network起源宣告网段
  • vpnv4的反射器,AR1/AR2重分布默认路由进BGP vpn地址族
  • 配置AS-PATH添加,route-map,对收到的路由进行选路干预
  • LSW5收到的默认路由负载均衡,最大优选路径设置2
  • 当HQ两条出口链路中断,LSW3/LSW4的去往branch 172.17.100.0/24的不走FW2的默认路由 ,track默认路由检测互联AR1/AR2的链路
  • AR路由器的故障快速切换,在VPN路由收敛前切换

  • AR1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    #
    mpls lsr-id 1.1.1.1
    mpls
    #
    mpls ldp
    #
    interface GigabitEthernet0/0/0
    mpls
    mpls ldp
    #
    interface GigabitEthernet0/0/1
    mpls
    mpls ldp
    #
    ip vpn-instance entvpn
    ipv4-family
    route-distinguisher 64812:1
    vpn frr route-policy VPN-FRR
    vpn-target 64812:345 both
    #
    interface GigabitEthernet0/0/2.10
    ip binding vpn-instance entvpn
    ip address 172.16.1.1 255.255.255.252
    #
    ospf 100 router-id 1.1.1.1 vpn-instance entvpn
    import-route bgp
    area 0.0.0.0
    network 172.16.1.1 0.0.0.0
    #
    bgp 64812
    #
    ipv4-family vpn-instance entvpn
    default-route imported
    import-route ospf 100
    #
    route-policy VPN-FRR permit node 10
    apply backup-nexthop auto
    #
  • AR2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    #
    mpls lsr-id 1.1.1.2
    mpls
    #
    mpls ldp
    #
    interface GigabitEthernet0/0/0
    mpls
    mpls ldp
    #
    interface GigabitEthernet0/0/1
    mpls
    mpls ldp
    #
    #
    ip vpn-instance entvpn
    ipv4-family
    route-distinguisher 64812:1
    vpn frr route-policy VPN-FRR
    vpn-target 64812:345 both
    #
    interface GigabitEthernet0/0/2.20
    ip binding vpn-instance entvpn
    ip address 172.16.2.1 255.255.255.252
    #
    ospf 100 router-id 1.1.1.2 vpn-instance entvpn
    import-route bgp
    area 0.0.0.0
    network 172.16.2.1 0.0.0.0
    #
    bgp 64812
    #
    ipv4-family vpn-instance entvpn
    default-route imported
    import-route ospf 100
    #
    route-policy VPN-FRR permit node 10
    apply backup-nexthop auto
    #
  • AR3

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    #
    mpls lsr-id 1.1.1.3
    mpls
    #
    mpls ldp
    #
    interface GigabitEthernet0/0/0
    mpls
    mpls ldp
    #
    interface GigabitEthernet0/0/2
    pim sm
    mpls
    mpls ldp
    #
    #
    ip vpn-instance entvpn
    ipv4-family
    route-distinguisher 64812:1
    vpn frr route-policy VPN-FRR
    vpn-target 64812:345 both
    #
    interface GigabitEthernet0/0/1.10
    ip binding vpn-instance entvpn
    ip address 172.17.1.1 255.255.255.252
    #
    bgp 64812
    #
    ipv4-family vpn-instance entvpn
    peer 172.17.1.2 as-number 62012
    #
    route-policy VPN-FRR permit node 10
    apply backup-nexthop auto
    #
  • AR4

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    #
    mpls lsr-id 1.1.1.4
    mpls
    #
    mpls ldp
    #
    interface GigabitEthernet0/0/0
    mpls
    mpls ldp
    #
    interface GigabitEthernet0/0/2
    pim sm
    mpls
    mpls ldp
    #
    #
    ip vpn-instance entvpn
    ipv4-family
    route-distinguisher 64812:1
    vpn frr route-policy VPN-FRR
    vpn-target 64812:345 both
    #
    interface GigabitEthernet3/0/0.20
    ip binding vpn-instance entvpn
    ip address 172.17.2.1 255.255.255.252
    #
    bgp 64812
    #
    ipv4-family vpn-instance entvpn
    peer 172.17.2.2 as-number 62012
    #
    route-policy VPN-FRR permit node 10
    apply backup-nexthop auto
    #
  • CR1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    #
    mpls lsr-id 1.1.1.5
    mpls
    #
    mpls ldp
    #
    interface GigabitEthernet0/0/0
    mpls
    mpls ldp
    #
    interface GigabitEthernet0/0/1
    mpls
    mpls ldp
    #
    interface GigabitEthernet0/0/2
    mpls
    mpls ldp
    #
  • CR2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    #
    mpls lsr-id 1.1.1.6
    mpls
    #
    mpls ldp
    #
    interface GigabitEthernet0/0/0
    mpls
    mpls ldp
    #
    interface GigabitEthernet0/0/1
    mpls
    mpls ldp
    #
    interface GigabitEthernet0/0/2
    mpls
    mpls ldp
    #
  • LSW3

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    #
    ospf 100
    default-route-advertise
    silent-interface Vlanif100
    area 0.0.0.0
    network 172.16.1.2 0.0.0.0
    network 172.16.5.1 0.0.0.0
    network 172.16.100.1 0.0.0.0
    #
    nqa test-instance toAR1 toAR1
    test-type icmp
    destination-address ipv4 172.16.1.1
    frequency 5
    interval seconds 1
    timeout 1
    probe-count 2
    start now
    #
    ip route-static 0.0.0.0 0.0.0.0 172.16.3.2 track nqa toAR1 toAR1

  • LSW4

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    #
    ospf 100
    default-route-advertise
    silent-interface Vlanif101
    area 0.0.0.0
    network 172.16.2.2 0.0.0.0
    network 172.16.5.2 0.0.0.0
    network 172.16.101.1 0.0.0.0
    #
    nqa test-instance toAR2 toAR2
    test-type icmp
    destination-address ipv4 172.16.2.1
    frequency 5
    interval seconds 1
    timeout 1
    probe-count 2
    start now
    #
    ip route-static 0.0.0.0 0.0.0.0 172.16.4.2 track nqa toAR2 toAR2

  • LSW5

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    #
    bgp 62012
    peer 172.17.1.1 as-number 64812
    peer 172.17.2.1 as-number 64812
    #
    ipv4-family unicast
    network 172.17.100.0 255.255.255.0
    maximum load-balancing 2
    peer 172.17.1.1 route-policy AS_PATH_ODD import
    peer 172.17.2.1 route-policy AS_PATH_EVEN import
    #
    #
    route-policy AS_PATH_EVEN permit node 10
    if-match acl 2010
    apply as-path 100 additive
    #
    route-policy AS_PATH_EVEN permit node 20
    #
    route-policy AS_PATH_ODD permit node 10
    if-match acl 2020
    apply as-path 100 additive
    #
    route-policy AS_PATH_ODD permit node 20
    #
    acl number 2010
    rule 5 permit source 172.16.0.0 0.0.254.255
    #
    acl number 2020
    rule 5 permit source 172.16.1.0 0.0.254.255
    #
  • 验证

    • PC3 172.17.100.0/24 去往HQ的流量路径

      image-124208233

    • PC3 172.17.100.0/24 访问internet

      image-124336943

    • AR3查看FRR

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      [AR3]dis ip rou vpn-instance entvpn 172.16.100.0 v
      Route Flags: R - relay, D - download to fib
      ------------------------------------------------------------------------------
      Routing Table : entvpn
      Summary Count : 1

      Destination: 172.16.100.0/24
      Protocol: IBGP Process ID: 0
      Preference: 255 Cost: 3
      NextHop: 1.1.1.1 Neighbour: 1.1.1.5
      State: Active Adv Relied Age: 00h01m41s
      Tag: 0 Priority: low
      Label: 1054 QoSInfo: 0x0
      IndirectID: 0x10
      RelayNextHop: 10.3.5.1 Interface: GigabitEthernet0/0/2
      TunnelID: 0x1 Flags: RD
      BkNextHop: 1.1.1.2 BkInterface: GigabitEthernet0/0/2
      BkLabel: 1053 SecTunnelID: 0x0
      BkPETunnelID: 0x3 BkPESecTunnelID: 0x0
      BkIndirectID: 0x14
      [AR3]

4.7 Task 7: Service Deployment for Communication Between the Enterprise and Data Center Servers

4.7.1 Configuring a Virtual System on the Firewall

  • FW1配置vsys,服务OA server,鼠标点点也挺快

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    #
    vsys enable
    resource-class ent_resource
    resource-item-limit session reserved-number 1000 maximum 5000
    resource-item-limit bandwidth 8 outbound
    resource-item-limit policy reserved-number 200
    resource-item-limit user reserved-number 100
    resource-item-limit l2tp-tunnel reserved-number 10
    resource-item-limit ipsec-tunnel reserved-number 10
    #
    # 绑定vpn-instance,重新配置IP地址
    vsys name entvsys
    assign interface LoopBack0
    assign interface GigabitEthernet1/0/1.50
    assign interface GigabitEthernet1/0/1.60
    assign interface GigabitEthernet1/0/2.50
    assign interface GigabitEthernet1/0/2.60
    assign resource-class ent_resource
    #
    firewall zone trust
    add interface GigabitEthernet1/0/1.50
    add interface GigabitEthernet1/0/2.50
    #
    firewall zone untrust
    add interface GigabitEthernet1/0/1.60
    add interface GigabitEthernet1/0/2.60
    #

4.7.2 Connecting the OA Server to the Network

  • LSW1/LSW2配置vrf entvpn,vlanif100 划入entvpn
  • vrrp配置,virtual-ip 192.168.100.1/24,LSW1 master,优先级120,抢占延迟20s
  • LSW1 track G0/0/1 接口,中断后优先级减21,LSW2抢占为master
  • 配置出向路由,交换机默认路由指向FW1;FW1的vsys entvsys,配置出向的主备份路由
  • 配置入向路由,交换机配置指向100.1.1.10/32 的静态路由指向FW1;FW1配置去往OA192.168.100.0/24的主备路由

  • LSW1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    #
    ip vpn-instance entvpn
    ipv4-family
    #
    interface Vlanif100
    description VPN-entvpn
    ip binding vpn-instance entvpn
    ip address 192.168.100.8 255.255.255.0
    vrrp vrid 1 virtual-ip 192.168.100.1
    vrrp vrid 1 priority 120
    vrrp vrid 1 preempt-mode timer delay 20
    vrrp vrid 1 track interface GigabitEthernet0/0/1 reduced 21
    #
    interface Vlanif50
    description VPN-entvpn
    ip binding vpn-instance entvpn
    ip address 192.168.5.1 255.255.255.252
    #
    ip route-static 100.1.1.10 255.255.255.255 100.1.6.2
    ip route-static vpn-instance entvpn 0.0.0.0 0.0.0.0 192.168.5.2
    #
  • LSW2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    #
    ip vpn-instance entvpn
    ipv4-family
    #
    interface Vlanif100
    description VPN-entvpn
    ip binding vpn-instance entvpn
    ip address 192.168.100.9 255.255.255.0
    vrrp vrid 1 virtual-ip 192.168.100.1
    vrrp vrid 1 preempt-mode timer delay 20
    #
    interface Vlanif50
    description VPN-entvpn
    ip binding vpn-instance entvpn
    ip address 192.168.50.1 255.255.255.252
    #
    ip route-static 100.1.1.10 255.255.255.255 100.1.60.2
    ip route-static vpn-instance entvpn 0.0.0.0 0.0.0.0 192.168.50.2
    #
  • FW1

    1
    2
    3
    4
    5
    6
    7
    #
    switch vsys entvsys
    #
    ip route-static 0.0.0.0 0.0.0.0 100.1.6.1
    ip route-static 0.0.0.0 0.0.0.0 100.1.60.1 preference 90
    ip route-static 192.168.100.0 255.255.255.0 192.168.5.1
    ip route-static 192.168.100.0 255.255.255.0 192.168.50.1 preference 90

4.7.3 Configuring IPsec Tunnels

  • 配置172.16.100.0/24和172.17.100.0/24 走ipsec访问OA 192.168.100.0/24
  • 使用IKE 协商模式
  • 自动触发建立隧道
  • 看图表设置参数

  • AR1

    1
    2
    3
    4
    5
    #
    bgp 64812
    #
    ipv4-family unicast
    network 200.1.6.0 255.255.255.252
  • AR2

    1
    2
    3
    4
    5
    #
    bgp 64812
    #
    ipv4-family unicast
    network 200.1.7.0 255.255.255.252
  • LSW1

    1
    2
    3
    4
    5
    #
    bgp 62022
    #
    ipv4-family unicast
    network 100.1.6.0 255.255.255.252
  • LSW2

    1
    2
    3
    4
    5
    #
    bgp 62022
    #
    ipv4-family unicast
    network 100.1.60.0 255.255.255.252
  • FW1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    70
    71
    72
    #
    acl number 3000
    rule 5 permit ip source 192.168.100.0 0.0.0.255 destination 172.16.100.0 0.0.0.255
    rule 10 permit ip source 192.168.100.0 0.0.0.255 destination 172.17.100.0 0.0.0.255
    #
    ipsec proposal ipsec_proposal
    esp authentication-algorithm sha2-256
    esp encryption-algorithm aes-256
    #
    ike proposal 10
    encryption-algorithm aes-256
    dh group14
    authentication-algorithm sha2-256
    authentication-method pre-share
    integrity-algorithm hmac-sha2-256
    prf hmac-sha2-256
    #
    ike peer fw0201
    pre-shared-key Huawei@123
    ike-proposal 10
    remote-id-type any
    remote-address 200.1.6.2
    ike peer fw0202
    pre-shared-key Huawei@123
    ike-proposal 10
    remote-id-type any
    remote-address 200.1.7.2
    #
    ipsec policy ipsec01 10 isakmp
    security acl 3000
    ike-peer fw0201
    proposal ipsec_proposal
    ipsec policy ipsec02 10 isakmp
    security acl 3000
    ike-peer fw0202
    proposal ipsec_proposal
    # undo policy enable # 策略禁用命令
    #
    interface GigabitEthernet1/0/1.60
    ipsec policy ipsec01
    #
    interface GigabitEthernet1/0/2.60
    ipsec policy ipsec02
    #
    security-policy
    rule name ipsec_in_sp
    source-zone untrust
    destination-zone local
    source-address 200.1.6.0 mask 255.255.255.0
    source-address 200.1.7.0 mask 255.255.255.0
    action permit
    rule name ipsec_out_sp
    source-zone local
    destination-zone untrust
    destination-address 200.1.6.2 mask 255.255.255.255
    destination-address 200.1.7.2 mask 255.255.255.255
    action permit
    rule name trust2untrust
    source-zone trust
    destination-zone untrust
    source-address 192.168.100.0 mask 255.255.255.0
    destination-address 172.16.100.0 mask 255.255.255.0
    destination-address 172.17.100.0 mask 255.255.255.0
    action permit
    rule name untrust2trust
    source-zone untrust
    destination-zone trust
    source-address 172.16.100.0 mask 255.255.255.0
    source-address 172.17.100.0 mask 255.255.255.0
    destination-address 192.168.100.0 mask 255.255.255.0
    action permit
    #
  • FW2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    70
    71
    72
    73
    74
    75
    76
    77
    #
    acl number 3000
    rule 5 permit ip source 172.16.100.0 0.0.0.255 destination 192.168.100.0 0.0.0.255
    rule 10 permit ip source 172.17.100.0 0.0.0.255 destination 192.168.100.0 0.0.0.255
    #
    ipsec proposal ipsec_proposal # 使用默认值,不用敲以下2行命令
    esp authentication-algorithm sha2-256
    esp encryption-algorithm aes-256
    #
    ike proposal 10 # 使用默认值,不用敲以下6行命令
    encryption-algorithm aes-256
    dh group14
    authentication-algorithm sha2-256
    authentication-method pre-share
    integrity-algorithm hmac-sha2-256
    prf hmac-sha2-256
    #
    ike peer fw0101
    pre-shared-key Huawei@123
    ike-proposal 10
    remote-id-type any
    remote-address 100.1.6.2
    ike peer fw0102
    pre-shared-key Huawei@123
    ike-proposal 10
    remote-id-type any
    remote-address 100.1.60.2
    #
    ipsec policy ipsec01 10 isakmp
    security acl 3000
    ike-peer fw0101
    proposal ipsec_proposal
    ipsec policy ipsec02 10 isakmp
    security acl 3000
    ike-peer fw0102
    proposal ipsec_proposal
    #
    interface GigabitEthernet1/0/3.60
    ipsec policy ipsec01
    #
    interface GigabitEthernet1/0/4.70
    ipsec policy ipsec02
    #
    security-policy
    rule name trust2untrust01
    source-zone trust
    destination-zone untrust
    source-address 172.16.100.0 mask 255.255.255.0
    source-address 172.17.100.0 mask 255.255.255.0
    profile ips Profile_ips_pc
    action permit
    rule name trust2untrust02
    source-zone trust
    destination-zone untrust
    source-address 172.16.101.0 mask 255.255.255.0
    destination-address 192.168.100.0 mask 255.255.255.0
    action permit
    rule name ipsec_out_sp
    source-zone local
    destination-zone untrust
    destination-address 100.1.6.2 mask 255.255.255.255
    destination-address 100.1.60.2 mask 255.255.255.255
    action permit
    rule name ipsec_in_sp
    source-zone untrust
    destination-zone local
    source-address 100.1.6.2 mask 255.255.255.255
    source-address 100.1.60.2 mask 255.255.255.255
    action permit
    rule name untrust2trust
    source-zone untrust
    destination-zone trust
    source-address 192.168.100.0 mask 255.255.255.0
    destination-address 172.16.100.0 mask 255.255.255.0
    destination-address 172.17.100.0 mask 255.255.255.0
    action permit
    #
  • 校验

    • dis ipsec sa

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      22
      23
      24
      25
      26
      27
      28
      29
      30
      31
      32
      33
      34
      35
      36
      37
      38
      39
      40
      41
      42
      43
      44
      45
      46
      47
      48
      49
      50
      51
      52
      53
      54
      55
      56
      57
      58
      59
      60
      61
      62
      63
      64
      65
      66
      67
      68
      69
      70
      71
      72
      73
      74
      75
      76
      77
      78
      79
      80
      81
      82
      83
      84
      85
      86
      87
      88
      89
      90
      91
      92
      93
      94
      95
      96
      97
      98
      99
      100
      101
      102
      103
      104
      105
      106
      107
      108
      109
      110
      111
      112
      113
      114
      115
      116
      117
      118
      119
      120
      121
      122
      123
      124
      125
      126
      127
      128
      129
      130
      131
      132
      133
      134
      135
      136
      137
      138
      139
      140
      141
      142
      143
      144
      145
      [FW1-entvsys]dis ipsec sa
      2024-07-17 09:00:34.530

      ipsec sa information:

      ===============================
      Interface: GigabitEthernet1/0/1.60
      ===============================

      -----------------------------
      IPSec policy name: "ipsec01"
      Sequence number : 10
      Acl group : 3000
      Acl rule : 5
      Mode : ISAKMP
      -----------------------------
      Connection ID : 7
      Encapsulation mode: Tunnel
      Holding time : 0d 1h 12m 55s
      Tunnel local : 100.1.6.2:500
      Tunnel remote : 200.1.6.2:500
      Flow source : 192.168.100.0/255.255.255.0 0/0-65535
      Flow destination : 172.16.100.0/255.255.255.0 0/0-65535

      [Outbound ESP SAs]
      SPI: 199477355 (0xbe3c86b)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485721/2324
      Max sent sequence-number: 665
      UDP encapsulation used for NAT traversal: N
      SA encrypted packets (number/bytes): 664/39936

      [Inbound ESP SAs]
      SPI: 187864131 (0xb329443)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485760/2324
      Max received sequence-number: 1
      UDP encapsulation used for NAT traversal: N
      SA decrypted packets (number/bytes): 0/0
      Anti-replay : Enable
      Anti-replay window size: 1024

      -----------------------------
      IPSec policy name: "ipsec01"
      Sequence number : 10
      Acl group : 3000
      Acl rule : 10
      Mode : ISAKMP
      -----------------------------
      Connection ID : 6
      Encapsulation mode: Tunnel
      Holding time : 0d 0h 39m 25s
      Tunnel local : 100.1.6.2:500
      Tunnel remote : 200.1.6.2:500
      Flow source : 192.168.100.0/255.255.255.0 0/0-65535
      Flow destination : 172.17.100.0/255.255.255.0 0/0-65535

      [Outbound ESP SAs]
      SPI: 192541812 (0xb79f474)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485722/1237
      Max sent sequence-number: 666
      UDP encapsulation used for NAT traversal: N
      SA encrypted packets (number/bytes): 665/39900

      [Inbound ESP SAs]
      SPI: 186945386 (0xb248f6a)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485754/1237
      Max received sequence-number: 64
      UDP encapsulation used for NAT traversal: N
      SA decrypted packets (number/bytes): 106/6360
      Anti-replay : Enable
      Anti-replay window size: 1024

      ===============================
      Interface: GigabitEthernet1/0/2.60
      ===============================

      -----------------------------
      IPSec policy name: "ipsec02"
      Sequence number : 10
      Acl group : 3000
      Acl rule : 5
      Mode : ISAKMP
      -----------------------------
      Connection ID : 8
      Encapsulation mode: Tunnel
      Holding time : 0d 0h 53m 39s
      Tunnel local : 100.1.60.2:500
      Tunnel remote : 200.1.7.2:500
      Flow source : 192.168.100.0/255.255.255.0 0/0-65535
      Flow destination : 172.16.100.0/255.255.255.0 0/0-65535

      [Outbound ESP SAs]
      SPI: 195126685 (0xba1659d)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485760/3407
      Max sent sequence-number: 1
      UDP encapsulation used for NAT traversal: N
      SA encrypted packets (number/bytes): 0/0

      [Inbound ESP SAs]
      SPI: 195412318 (0xba5c15e)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485753/3407
      Max received sequence-number: 128
      UDP encapsulation used for NAT traversal: N
      SA decrypted packets (number/bytes): 133/7980
      Anti-replay : Enable
      Anti-replay window size: 1024

      -----------------------------
      IPSec policy name: "ipsec02"
      Sequence number : 10
      Acl group : 3000
      Acl rule : 10
      Mode : ISAKMP
      -----------------------------
      Connection ID : 5
      Encapsulation mode: Tunnel
      Holding time : 0d 0h 42m 10s
      Tunnel local : 100.1.60.2:500
      Tunnel remote : 200.1.7.2:500
      Flow source : 192.168.100.0/255.255.255.0 0/0-65535
      Flow destination : 172.17.100.0/255.255.255.0 0/0-65535

      [Outbound ESP SAs]
      SPI: 184686406 (0xb021746)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485760/1071
      Max sent sequence-number: 1
      UDP encapsulation used for NAT traversal: N
      SA encrypted packets (number/bytes): 0/0

      [Inbound ESP SAs]
      SPI: 187927920 (0xb338d70)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485699/1071
      Max received sequence-number: 1216
      UDP encapsulation used for NAT traversal: N
      SA decrypted packets (number/bytes): 1044/63024
      Anti-replay : Enable
      Anti-replay window size: 1024
      [FW1-entvsys]
    • dis ipsec sa

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      22
      23
      24
      25
      26
      27
      28
      29
      30
      31
      32
      33
      34
      35
      36
      37
      38
      39
      40
      41
      42
      43
      44
      45
      46
      47
      48
      49
      50
      51
      52
      53
      54
      55
      56
      57
      58
      59
      60
      61
      62
      63
      64
      65
      66
      67
      68
      69
      70
      71
      72
      73
      74
      75
      76
      77
      78
      79
      80
      81
      82
      83
      84
      85
      86
      87
      88
      89
      90
      91
      92
      93
      94
      95
      96
      97
      98
      99
      100
      101
      102
      103
      104
      105
      106
      107
      108
      109
      110
      111
      112
      113
      114
      115
      116
      117
      118
      119
      120
      121
      122
      123
      124
      125
      126
      127
      128
      129
      130
      131
      132
      133
      134
      135
      136
      137
      138
      139
      140
      141
      142
      143
      144
      145
      [FW2]dis ipsec sa
      2024-07-17 09:01:41.270

      ipsec sa information:

      ===============================
      Interface: GigabitEthernet1/0/3.60
      ===============================

      -----------------------------
      IPSec policy name: "ipsec01"
      Sequence number : 10
      Acl group : 3000
      Acl rule : 5
      Mode : ISAKMP
      -----------------------------
      Connection ID : 47
      Encapsulation mode: Tunnel
      Holding time : 0d 1h 14m 2s
      Tunnel local : 200.1.6.2:500
      Tunnel remote : 100.1.6.2:500
      Flow source : 172.16.100.0/255.255.255.0 0/0-65535
      Flow destination : 192.168.100.0/255.255.255.0 0/0-65535

      [Outbound ESP SAs]
      SPI: 187864131 (0xb329443)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485760/2257
      Max sent sequence-number: 1
      UDP encapsulation used for NAT traversal: N
      SA encrypted packets (number/bytes): 0/0

      [Inbound ESP SAs]
      SPI: 199477355 (0xbe3c86b)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485719/2257
      Max received sequence-number: 704
      UDP encapsulation used for NAT traversal: N
      SA decrypted packets (number/bytes): 708/42576
      Anti-replay : Enable
      Anti-replay window size: 1024

      -----------------------------
      IPSec policy name: "ipsec01"
      Sequence number : 10
      Acl group : 3000
      Acl rule : 10
      Mode : ISAKMP
      -----------------------------
      Connection ID : 45
      Encapsulation mode: Tunnel
      Holding time : 0d 0h 40m 31s
      Tunnel local : 200.1.6.2:500
      Tunnel remote : 100.1.6.2:500
      Flow source : 172.17.100.0/255.255.255.0 0/0-65535
      Flow destination : 192.168.100.0/255.255.255.0 0/0-65535

      [Outbound ESP SAs]
      SPI: 186945386 (0xb248f6a)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485754/1170
      Max sent sequence-number: 107
      UDP encapsulation used for NAT traversal: N
      SA encrypted packets (number/bytes): 106/6360

      [Inbound ESP SAs]
      SPI: 192541812 (0xb79f474)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485719/1170
      Max received sequence-number: 704
      UDP encapsulation used for NAT traversal: N
      SA decrypted packets (number/bytes): 707/42420
      Anti-replay : Enable
      Anti-replay window size: 1024

      ===============================
      Interface: GigabitEthernet1/0/4.70
      ===============================

      -----------------------------
      IPSec policy name: "ipsec02"
      Sequence number : 10
      Acl group : 3000
      Acl rule : 5
      Mode : ISAKMP
      -----------------------------
      Connection ID : 48
      Encapsulation mode: Tunnel
      Holding time : 0d 0h 54m 40s
      Tunnel local : 200.1.7.2:500
      Tunnel remote : 100.1.60.2:500
      Flow source : 172.16.100.0/255.255.255.0 0/0-65535
      Flow destination : 192.168.100.0/255.255.255.0 0/0-65535

      [Outbound ESP SAs]
      SPI: 195412318 (0xba5c15e)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485750/3347
      Max sent sequence-number: 178
      UDP encapsulation used for NAT traversal: N
      SA encrypted packets (number/bytes): 177/10620

      [Inbound ESP SAs]
      SPI: 195126685 (0xba1659d)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485760/3347
      Max received sequence-number: 1
      UDP encapsulation used for NAT traversal: N
      SA decrypted packets (number/bytes): 0/0
      Anti-replay : Enable
      Anti-replay window size: 1024

      -----------------------------
      IPSec policy name: "ipsec02"
      Sequence number : 10
      Acl group : 3000
      Acl rule : 10
      Mode : ISAKMP
      -----------------------------
      Connection ID : 44
      Encapsulation mode: Tunnel
      Holding time : 0d 0h 43m 11s
      Tunnel local : 200.1.7.2:500
      Tunnel remote : 100.1.60.2:500
      Flow source : 172.17.100.0/255.255.255.0 0/0-65535
      Flow destination : 192.168.100.0/255.255.255.0 0/0-65535

      [Outbound ESP SAs]
      SPI: 187927920 (0xb338d70)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485683/1011
      Max sent sequence-number: 1317
      UDP encapsulation used for NAT traversal: N
      SA encrypted packets (number/bytes): 1316/79344

      [Inbound ESP SAs]
      SPI: 184686406 (0xb021746)
      Proposal: ESP-ENCRYPT-AES-256 ESP-AUTH-SHA2-256-128
      SA remaining key duration (kilobytes/sec): 10485760/1011
      Max received sequence-number: 1
      UDP encapsulation used for NAT traversal: N
      SA decrypted packets (number/bytes): 0/0
      Anti-replay : Enable
      Anti-replay window size: 1024
      [FW2]
    • PC1 ping OA

      image-170314062

    • PC3 ping OA

      image-170423691

4.7.4 Configuring an L2TP over IPsec Tunnel

  • 配置l2tp over ipsec

  • FW1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    # 切换虚拟系统,以下配置都在entvsys下配置
    switch vsys entvsys
    # 创建user001,每次启动都需要操作一次,产品手册中指示存于数据库中,而模拟器没硬盘没这货
    user-manage user user0001
    password Huawei@123
    #
    interface Virtual-Template0
    ppp authentication-mode chap
    remote address 30.30.30.2
    ip address 30.30.30.1 255.255.255.252
    #
    firewall zone dmz
    add interface Virtual-Template0
    #
    l2tp enable
    l2tp-group 1
    tunnel password cipher Huawei@123
    tunnel name lns
    allow l2tp virtual-template 0 remote lac
    #
    acl number 3000
    rule 15 permit udp source-port eq 1701
    #
    security-policy
    rule name trust2dmz
    source-zone trust
    destination-zone dmz
    source-address 192.168.100.0 mask 255.255.255.0
    destination-address 30.30.30.0 mask 255.255.255.252
    action permit
    rule name dmz2trust
    source-zone dmz
    destination-zone trust
    source-address 30.30.30.0 mask 255.255.255.252
    destination-address 192.168.100.0 mask 255.255.255.0
    action permit
    rule name untrust2local
    source-zone untrust
    destination-zone local
    source-address 200.1.1.11 mask 255.255.255.255
    destination-address 100.1.1.10 mask 255.255.255.255
    action permit
    rule name any
    action permit
    #

  • FW2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    #
    l2tp enable
    #
    l2tp-group 1
    tunnel password cipher Huawei@123
    tunnel name lac
    tunnel source LoopBack0
    start l2tp ip 100.1.1.10 fullusername user001
    #
    interface Virtual-Template0
    ppp authentication-mode chap
    ppp chap user user001
    ppp chap password cipher Huawei@123
    ip address ppp-negotiate
    call-lns local-user user001
    #
    policy-based-route
    rule name l2tp 1
    source-zone trust
    source-address 172.16.101.0 mask 255.255.255.0
    destination-address 192.168.100.0 mask 255.255.255.0
    action pbr egress-interface Virtual-Template0
    #
    nat-policy
    rule name l2tp
    source-zone trust
    egress-interface Virtual-Template0
    source-address 172.16.101.0 mask 255.255.255.0
    destination-address 192.168.100.0 mask 255.255.255.0
    action source-nat easy-ip
    #
    acl number 3000
    rule 15 permit udp destination-port eq 1701
    #
    security-policy
    rule name trust2dmz
    source-zone trust
    destination-zone dmz
    source-address 172.16.101.0 mask 255.255.255.0
    destination-address 192.168.100.0 mask 255.255.255.0
    action permit
    rule name dmz2trust
    source-zone dmz
    destination-zone trust
    source-address 30.30.30.2 mask 255.255.255.255
    destination-address 172.16.101.0 mask 255.255.255.0
    action permit
    rule name local2untrust
    source-zone local
    destination-zone untrust
    source-address 200.1.1.11 mask 255.255.255.255
    destination-address 100.1.1.10 mask 255.255.255.255
    action permit
    #

  • 验证

    • PC1 PC2 PC3 ping OA 192.168.100.254

      image-042024690

    • FW2查看l2tp隧道

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      [FW2]dis l2tp tunnel  
      2024-07-18 20:01:48.860
      L2TP::Total Tunnel: 1

      LocalTID RemoteTID RemoteAddress Port Sessions RemoteName VpnInstance
      ------------------------------------------------------------------------------
      1 1 100.1.1.10 1701 1 lns
      ------------------------------------------------------------------------------
      Total 1, 1 printed

      [FW2]dis l2tp session
      2024-07-18 20:01:51.360
      L2TP::Total Session: 1

      LocalSID RemoteSID LocalTID RemoteTID UserID UserName VpnInstance
      ------------------------------------------------------------------------------
      69 41 1 1 user001
      ------------------------------------------------------------------------------
      Total 1, 1 printed

      [FW2]
    • FW2查看加密计数

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      22
      23
      24
      25
      26
      27
      28
      29
      30
      31
      32
      33
      [FW2]dis ipsec statistics 
      2024-07-18 20:21:08.960
      IPSec statistics information:
      Number of IPSec tunnels: 5
      Number of standby IPSec tunnels: 0
      the security packet statistics:
      input/output security packets: 5082/5457
      input/output security bytes: 335843/362318
      input/output dropped security packets: 4/7
      the encrypt packet statistics:
      send chip: 5457, recv chip: 5457, send err: 2
      local cpu: 5457, other cpu: 0, recv other cpu: 0
      intact packet: 5457, first slice: 0, after slice: 0
      the decrypt packet statistics:
      send chip: 5082, recv chip: 5082, send err: 0
      local cpu: 5082, other cpu: 0, recv other cpu: 0
      reass first slice: 0, after slice: 0
      dropped security packet detail:
      can not find SA: 0, wrong SA: 0
      authentication: 0, replay: 0
      front recheck: 0, after recheck: 4
      change cpu enc: 0, dec change cpu: 0
      fib search: 0, output l3: 2
      flow err: 5, slice err: 0, byte limit: 0
      slave drop: 0
      negotiate about packet statistics:
      IKE fwd packet ok: 46, err: 0
      IKE ctrl packet inbound ok: 46, outbound ok: 68
      SoftExpr: 0, HardExpr: 0, DPDOper: 0
      trigger ok: 29, switch sa: 12, sync sa: 0
      recv IKE nat keepalive: 0, IKE input: 0

      [FW2]
    • FW查看ipsec状态

      image-042144749

4.8 Task 8: Multicast Service Deployment on the MAN

4.8.1 Configuring the Multicast Service

  • 配置MAN网络的组播网络,AR4 igmpv2,
  • CR1/CR2的loopback0接口选举bsr,配置优先级确保CR1成为bsr
  • 配置anycast RP,创建loopback10 0100.100.100./32,loopback10地址为c-rp
  • 配置msdp组播源发现协议
  • AR4的g0/0/01.100,限制组播地址
  • igmp加速离组

  • AR1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    #
    multicast routing-enable
    #
    interface GigabitEthernet0/0/0
    pim sm
    #
    interface GigabitEthernet0/0/1
    pim sm
    #
  • AR2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    #
    multicast routing-enable
    #
    interface GigabitEthernet0/0/0
    pim sm
    #
    interface GigabitEthernet0/0/1
    pim sm
    #
  • AR3

    1
    2
    3
    4
    5
    6
    7
    8
    9
    #
    multicast routing-enable
    #
    interface GigabitEthernet0/0/0
    pim sm
    #
    interface GigabitEthernet0/0/2
    pim sm
    #
  • AR4

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    #
    multicast routing-enable
    #
    interface GigabitEthernet0/0/0
    pim sm
    #
    interface GigabitEthernet0/0/2
    pim sm
    #
    acl number 2000
    rule 5 permit source 224.1.1.0 0.0.0.255
    #
    interface GigabitEthernet0/0/1.100
    pim sm
    igmp enable
    igmp group-policy 2000 2
    igmp prompt-leave group-policy 2000
    #
  • CR1

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    #
    multicast routing-enable
    #
    interface GigabitEthernet0/0/0
    pim sm
    #
    interface GigabitEthernet0/0/1
    pim sm
    #
    interface GigabitEthernet0/0/2
    pim sm
    #
    interface Ethernet1/0/1
    pim sm
    #
    interface LoopBack0
    pim sm
    #
    interface LoopBack10
    ip address 100.100.100.100 255.255.255.255
    pim sm
    #
    bgp 64812
    #
    ipv4-family unicast
    network 100.100.100.100 255.255.255.255
    #
    pim
    c-bsr hash-length 0
    c-bsr priority 255
    c-bsr LoopBack0
    c-rp LoopBack10
    #
    msdp
    originating-rp LoopBack0
    peer 1.1.1.6 connect-interface LoopBack0
    #
  • CR2

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    #
    multicast routing-enable
    #
    interface GigabitEthernet0/0/0
    pim sm
    #
    interface GigabitEthernet0/0/1
    pim sm
    #
    interface GigabitEthernet0/0/2
    pim sm
    #
    interface LoopBack0
    pim sm
    #
    interface LoopBack10
    ip address 100.100.100.100 255.255.255.255
    pim sm
    #
    bgp 64812
    #
    ipv4-family unicast
    network 100.100.100.100 255.255.255.255
    #
    pim
    c-bsr hash-length 0
    c-bsr LoopBack0
    c-rp LoopBack10
    #
    msdp
    originating-rp LoopBack0
    peer 1.1.1.5 connect-interface LoopBack0
    #
  • 验证

    • dis pim rp-info

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      [AR4]dis pim bsr-info
      VPN-Instance: public net
      Elected AdminScoped BSR Count: 0
      Elected BSR Address: 1.1.1.5
      Priority: 255
      Hash mask length: 0
      State: Accept Preferred
      Scope: Not scoped
      Uptime: 00:00:50
      Expires: 00:01:20
      C-RP Count: 1
      [AR4]
      [AR4]dis pim rp-info
      VPN-Instance: public net
      PIM-SM BSR RP Number:1
      Group/MaskLen: 224.0.0.0/4
      RP: 100.100.100.100
      Priority: 0
      Uptime: 00:00:56
      Expires: 00:01:34
      [AR4]
    • dis pim routing-table

      1
      2
      3
      4
      5
      6
      7
      8
      9
      10
      11
      12
      13
      14
      15
      16
      17
      18
      19
      20
      21
      22
      23
      24
      25
      26
      27
      28
      29
      30
      31
      32
      33
      34
      35
      36
      37
      38
      39
      40
      41
      42
      43
      44
      45
      46
      47
      48
      49
      50
      51
      52
      53
      54
      55
      56
      57
      58
      59
      60
      61
      62
      63
      64
      65
      66
      67
      68
      69
      70
      71
      72
      73
      74
      75
      76
      77
      78
      [CR1]dis pim routing-table 
      VPN-Instance: public net
      Total 0 (*, G) entry; 1 (S, G) entry

      (100.1.100.2, 224.1.1.1)
      RP: 100.100.100.100 (local)
      Protocol: pim-sm, Flag: SPT 2MSDP LOC ACT
      UpTime: 00:03:16
      Upstream interface: Ethernet1/0/1
      Upstream neighbor: NULL
      RPF prime neighbor: NULL
      Downstream interface(s) information:
      Total number of downstreams: 1
      1: GigabitEthernet0/0/0
      Protocol: pim-sm, UpTime: 00:03:16, Expires: 00:03:14

      [CR1]

      [CR2]dis pim routing-table
      VPN-Instance: public net
      Total 1 (*, G) entry; 1 (S, G) entry

      (*, 224.1.1.1)
      RP: 100.100.100.100 (local)
      Protocol: pim-sm, Flag: WC
      UpTime: 00:17:28
      Upstream interface: Register
      Upstream neighbor: NULL
      RPF prime neighbor: NULL
      Downstream interface(s) information:
      Total number of downstreams: 1
      1: GigabitEthernet0/0/2
      Protocol: pim-sm, UpTime: 00:17:28, Expires: 00:03:02

      (100.1.100.2, 224.1.1.1)
      RP: 100.100.100.100 (local)
      Protocol: pim-sm, Flag: SPT MSDP ACT
      UpTime: 00:03:41
      Upstream interface: GigabitEthernet0/0/0
      Upstream neighbor: 10.5.6.1
      RPF prime neighbor: 10.5.6.1
      Downstream interface(s) information:
      Total number of downstreams: 1
      1: GigabitEthernet0/0/2
      Protocol: pim-sm, UpTime: 00:03:41, Expires: 00:02:49

      [CR2]

      [AR4]dis pim routing-table
      VPN-Instance: public net
      Total 1 (*, G) entry; 1 (S, G) entry

      (*, 224.1.1.1)
      RP: 100.100.100.100
      Protocol: pim-sm, Flag: WC
      UpTime: 00:17:42
      Upstream interface: GigabitEthernet0/0/2
      Upstream neighbor: 10.4.6.1
      RPF prime neighbor: 10.4.6.1
      Downstream interface(s) information:
      Total number of downstreams: 1
      1: GigabitEthernet0/0/1.100
      Protocol: igmp, UpTime: 00:17:42, Expires: -

      (100.1.100.2, 224.1.1.1)
      RP: 100.100.100.100
      Protocol: pim-sm, Flag: SPT ACT
      UpTime: 00:03:55
      Upstream interface: GigabitEthernet0/0/2
      Upstream neighbor: 10.4.6.1
      RPF prime neighbor: 10.4.6.1
      Downstream interface(s) information:
      Total number of downstreams: 1
      1: GigabitEthernet0/0/1.100
      Protocol: pim-sm, UpTime: 00:03:55, Expires: -

      [AR4]

    • 电脑安装vlc,ensp选择vlc安装路径,启动组播源服务器和PC4接收视频

      image-152518086

最后

  • 个人觉得整个拓扑的配置项还是挺多的,涉及的协议、框架、模型也挺多,有一定挑战
  • 现场8个小时给我整,我是整不出来,在没有做充足准备的前提下
  • 毕竟是实验,没有整防火墙双机热备
  • 毕竟是实验,RR还能跑数据和接入EBGP对等体
  • 毕竟是实验,AC与AC之间没有物理连线做状态监测
  • 毕竟是实验,单线路多逻辑互联
  • ……
  • 可能有更好的实现需求的配置答案(山外有山)
  • 文件存阿里云盘了,这是链接:[分享的文件]
  • 欢迎“来电”来函探讨。
2022-2023华为ICT大赛(全国)实验题研究 使用Selenium打开PNETLab拓扑并开启所有节点
Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×